Network Forensics Tracking Hackers Through Cyberspace
Wired for War: The Robotics Revolution and Conflict in the 21st Century
The Ten-Day MBA 4th Ed.: A Step-By-Step Guide To Mastering The Skills Taught In America's Top Business Schools
Revised and updated to answer the challenges of a rapidly changing business world, the 4th edition of The Ten-Day MBA includes the latest topics taught at America's top business schools, from corporate ethics and compliance to financial planning and real estate to leadership and negotiation. With more than 400,000 copies sold around the world, this internationally acclaimed guide distills the lessons of the most popular business school courses taught at Harvard, Stanford, the University of Pennsylvania, the University of Chicago, Northwestern, and the University of Virginia. Author Steven A. Silbiger delivers research straight from the notes of real MBA students attending these top programs today—giving you the tools you need to get ahead in business and in life.I didn't plan to add a third book so soon, but at work it appears the CIO has the IT Leadership Team reading this (or maybe it is just a suggestion for the "B School" program they are running for select invited individuals) and since I like to know the source of whatever , I won't say stupid, idea comes down the chain I picked up a copy too. Same basic idea behind the Cyber Security Reading List
Blogs / News -
Dark Reading - Cybersecurity Industry: It's Time to Stop the Victim Blame Game -
I propose we shift the narrative and our approach. Rather than adding to the noise of what a company probably did wrong, we can offer helpful suggestions for what others can do today. We can assume the role as educators — offering best-practice advice through published content and partnerships, as well as helping organizations sort through the alarmist FUD factor (fear, uncertainty, and doubt) and get to the practical nuts and bolts. We can help companies determine where to prioritize their dollars to reduce the chances of more significant attacks (or reduce response times should one occur), acknowledging they aren't going to purchase every tool or service available.Security Boulevard - Risk is a Parallel Circuit -
We can think of information security risk in much the same way – risk is a parallel circuit where you are only as strong as your weakest link. If you’ve done a good job of protecting against Attack Method #1, attackers will quickly move on to Attack Method #2, and so on, until they find the path of least resistance. In our Ohm’s law derived risk equation, this means that our areas of weakness have a greater likelihood of breach, and therefore have an outsized impact on our risk calculation, which intuitively, makes a lot of sense.evanm.website - Things I Learned From Five Years in Climate Tech -
As I’m sure this essay has made clear, five years of building technologies for sale to utilities has left me rather burnt out by the slow pace and legacy nature of the energy industry. That being said, I remain excited by the incredible work being done throughout the energy/climate startup ecosystem. I don’t mean to dissuade anyone from taking the plunge, but founding teams need to know what they’re signing up for.
And investors need to know what they’re funding. Energy is not the realm of hyper-growth SaaS apps that can scale to 10 million users in the blink of an eye. A utility might only have 20 people in their organization that will meaningfully use a specialized product. And it could take three years of sales and integration legwork to get a product paid for and incorporated into day-to-day work.Infosecurity Magazine - Ransomware Attack at US Power Station -
The Reading Municipal Light Department (RMLD) was targeted on Friday by cyber-criminals hoping to extort money by encrypting data in the station's computer system. Unfortunately for them, station bosses opted to hire an outside IT consultant to help them deal with the ransomware infection instead of paying for the return of their files.Twitter - Swift on Security -
Large organizations have terrible troubles with dashboards and percentages.— SwiftOnSecurity (@SwiftOnSecurity) February 26, 2020
95% antivirus coverage on a network with 50k clients are 2500 unprotected computers.
Nobody gets promoted for fixing the last 5%.
But five percent is an entire universe of failure.
No comments:
Post a Comment